Blame policy/modules/admin/sxid.if
|
Chris PeBenito |
b6cc2f |
## <summary>SUID/SGID program monitoring</summary>
|
|
Chris PeBenito |
b6cc2f |
|
|
Chris PeBenito |
b6cc2f |
########################################
|
|
Chris PeBenito |
b6cc2f |
## <summary>
|
|
Chris PeBenito |
b6cc2f |
## Allow the specified domain to read
|
|
Chris PeBenito |
b6cc2f |
## sxid log files.
|
|
Chris PeBenito |
b6cc2f |
## </summary>
|
|
Chris PeBenito |
b6cc2f |
## <param name="domain">
|
|
Chris PeBenito |
b6cc2f |
## <summary>
|
|
Chris PeBenito |
b6cc2f |
## Domain allowed access.
|
|
Chris PeBenito |
b6cc2f |
## </summary>
|
|
Chris PeBenito |
b6cc2f |
## </param>
|
|
Chris PeBenito |
bbcd3c |
## <rolecap/>
|
|
Chris PeBenito |
b6cc2f |
#
|
|
Chris PeBenito |
b6cc2f |
interface(`sxid_read_log',`
|
|
Chris PeBenito |
b6cc2f |
gen_require(`
|
|
Chris PeBenito |
b6cc2f |
type sxid_log_t;
|
|
Chris PeBenito |
b6cc2f |
')
|
|
Chris PeBenito |
b6cc2f |
|
|
Chris PeBenito |
b6cc2f |
logging_search_logs($1)
|
|
Chris PeBenito |
c0868a |
allow $1 sxid_log_t:file read_file_perms;
|
|
Chris PeBenito |
b6cc2f |
')
|